搜索结果: 1-7 共查到“军队指挥学 software implementations”相关记录7条 . 查询时间(0.14 秒)
Efficient and secure software implementations of Fantomas
LS-Design Fantomas side-channel resistance
2019/8/8
In this paper, the efficient software implementation and side-channel resistance of the LS-Design construction is studied through a series of software implementations of the Fantomas block cipher, one...
Fully Automated Differential Fault Analysis on Software Implementations of Cryptographic Algorithms
differential fault analysis cryptographic fault attacks automation
2018/6/5
Emerging technologies with the requirement of small size and portability, such as Internet-of-Things devices, represent a good target for physical attacks, e.g., fault attacks. These attacks often aim...
Efficient Software Implementations of Modular Exponentiation
modular arithmetic modular exponentiation Montgomery multiplication RSA
2012/3/28
RSA computations have a significant effect on the workloads of SSL/TLS servers, and therefore their software implementations on general purpose processors are an important target for optimization. We ...
Efficient Software Implementations of Modular Exponentiation
modular exponentiation Montgomery multiplication RSA
2011/6/8
RSA computations have a significant effect on the workloads of SSL/TLS servers, and therefore their software implementations on general purpose processors are an important target for optimization. We ...
Comparison of seven SHA-3 candidates software implementations on smart cards
seven SHA-3 candidates software implementations smart cards
2010/10/20
In this work, we present and compare seven SHA-3 second-round candidates implementations on two different architectures used on smart cards: the Intel 8051 and the ARM7TDMI. After presenting the perfo...
Higher-order Masking and Shuffling for Software Implementations of Block Ciphers– Extended Version –
Higher-order Masking Software Implementations Block Ciphers
2009/9/2
Differential Power Analysis (DPA) is a powerful side channel
key recovery attack that efficiently breaks block ciphers implementations.
In software, two main techniques are usually applied to thwart...
ASPECTS OF HYPERELLIPTIC CURVES OVER LARGE PRIME FIELDS IN SOFTWARE IMPLEMENTATIONS
HYPERELLIPTIC CURVES LARGE PRIME FIELDS SOFTWARE IMPLEMENTATIONS
2009/4/10
This paper presents an implementation of genus 2 and 3 hyperelliptic curves over prime fields,
with a comparison with elliptic curves. To achieve a fair comparison, we developed an ad-hoc
arithmetic...